-
1
-
-
77956353388
-
Trust management in mobile ad hoc networks using a maturity-based model
-
Sep.
-
P.B. Velloso, R.P. Laufer, D. de Cunha, O.C. Duarte, and G. Pujolle, "Trust management in mobile ad hoc networks using a maturity-based model," IEEE Trans. on Network and Service Management, Vol. 7, no. 3, Sep. 2010, pp. 172-185.
-
(2010)
IEEE Trans. on Network and Service Management
, vol.7
, Issue.3
, pp. 172-185
-
-
Velloso, P.B.1
Laufer, R.P.2
De Cunha, D.3
Duarte, O.C.4
Pujolle, G.5
-
2
-
-
45749109010
-
SybilGuard: Defending against sybil attacks via social networks
-
June
-
H. Yu, M. Kaminsky, P.B. Gibbons, and A.D. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE/ACM Transactions on Networking, Vol. 16, no. 3, June 2008, pp. 576-589.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
4
-
-
84858050885
-
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
-
J.H. Cho, A. Swami and LR. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks" Network and Computer Applications, Vol. 35, 2012, pp. 1001-1012.
-
(2012)
Network and Computer Applications
, vol.35
, pp. 1001-1012
-
-
Cho, J.H.1
Swami, A.2
Chen, L.R.3
-
5
-
-
77955116868
-
Small world in motion (SWLM): Modeling communities in ad-hoc mobile networking
-
Boston, MA, USA
-
S. Kosta, A. Mei, and J. Stefa, "Small World in Motion (SWLM): Modeling Communities in Ad-Hoc Mobile Networking," 7th IEEE Conf. Sensor, Mesh and Ad Hoc Communications and Networks, Boston, MA, USA, 2010.
-
(2010)
7th IEEE Conf. Sensor, Mesh and Ad Hoc Communications and Networks
-
-
Kosta, S.1
Mei, A.2
Stefa, J.3
-
6
-
-
0141858950
-
Analysis of replicated data with repair dependency
-
LR. Chen, and D.C. Wang, "Analysis of Replicated Data with Repair Dependency," The Computer Journal, Vol. 39, no. 9, 1996, pp. 767-779.
-
(1996)
The Computer Journal
, vol.39
, Issue.9
, pp. 767-779
-
-
Chen, L.R.1
Wang, D.C.2
-
7
-
-
0030381055
-
Analyzing dynamic voting using petri Nets
-
Niagara Falls, Canada
-
LR. Chen, and D.C. Wang, "Analyzing Dynamic Voting using Petri Nets," 15th IEEE Symposium on Reliable Distributed Systems, Niagara Falls, Canada, 1996, pp. 44-53.
-
(1996)
15th IEEE Symposium on Reliable Distributed Systems
, pp. 44-53
-
-
Chen, L.R.1
Wang, D.C.2
-
8
-
-
40849124634
-
Performance optimization of region-based group key management in mobile ad hoc networks
-
J.H. Cho, LR. Chen and D.C. Wang, "Performance Optimization of Region-based Group Key Management in Mobile Ad Hoc Networks," Performance Evaluation, Vol. 65, no. 5, 2008, pp. 319-344.
-
(2008)
Performance Evaluation
, vol.65
, Issue.5
, pp. 319-344
-
-
Cho, J.H.1
Chen, L.R.2
Wang, D.C.3
-
9
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
-
Vancouver, Canada
-
J. H. Cho, A. Swami and I. R. Chen, "Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks," Inter. Conf. Computational Science and Engineering, Vancouver, Canada, 2009, pp. 641-650.
-
(2009)
Inter. Conf. Computational Science and Engineering
, pp. 641-650
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
10
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
Nov.
-
J.H. Cho, A. Swami and LR. Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks," IEEE Communications Surveys & Tutorials, Vol. 13, No. 4, Nov. 2011, pp. 562-583.
-
(2011)
IEEE Communications Surveys & Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.H.1
Swami, A.2
Chen, L.R.3
-
11
-
-
84861334371
-
Trust computations and trust dynamics in mobile ad hoc networks: A survey
-
K. Govindan and P. Mohapatra, "Trust Computations and Trust Dynamics in Mobile Ad hoc Networks: A Survey," IEEE Communications Surveys & Tutorials, Vol. 14, no. 2, 2012, pp. 279-298.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
12
-
-
78649633783
-
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks
-
J.H. Cho, and LR Chen, "Performance Analysis of Hierarchical Group Key Management integrated with Adaptive Intrusion Detection in Mobile Ad Hoc Networks," Performance Evaluation, Vol. 67, 2010.
-
(2010)
Performance Evaluation
, vol.67
-
-
Cho, J.H.1
Chen, L.R.2
-
13
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
Montreal, Quebec, Canada
-
A. da Silva, et al, "Decentralized Intrusion Detection in Wireless Sensor Networks," ACM 1st Workshop on Quality of Service and Security in Wireless and Mobile Networks, Montreal, Quebec, Canada, 2005.
-
(2005)
ACM 1st Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
-
Da Silva, A.1
-
14
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection," IEEE Transactions on Network and Service Management, Vol. 9, no. 2, 2012, pp. 161-183.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 161-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
15
-
-
29844441381
-
NTM - Progressive trust negotiation in ad hoc networks
-
Dublin, Ireland
-
R.R.S. Verma, D. O'Mahony, and H. Tewari, "NTM - Progressive Trust Negotiation in Ad Hoc Networks," IEI/IEE Symposium on Telecommunications Systems Research, Dublin, Ireland, 2001, pp. 1-8.
-
(2001)
IEI/IEE Symposium on Telecommunications Systems Research
, pp. 1-8
-
-
Verma, R.R.S.1
O'Mahony, D.2
Tewari, H.3
-
16
-
-
29844435578
-
A localized trust management scheme for ad hoc networks
-
C.R. Davis, "A Localized Trust Management Scheme for Ad Hoc Networks," Inter. Conference on Networking, 2004, pp. 671-675.
-
(2004)
Inter. Conference on Networking
, pp. 671-675
-
-
Davis, C.R.1
-
17
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
R. Mitchell and I. R. Chen, "Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems," IEEE Transactions on Reliability, Vol. 62, no. 1, pp. 199-210, 2013.
-
(2013)
IEEE Transactions on Reliability
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.R.2
-
18
-
-
78751676469
-
Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks
-
I. R. Chen, A. P. Speer, and M. Eltoweissy, "Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks," IEEE Trans. on Dependable and Secure Computing, Vol. 8, no. 2, 2011, pp. 161-176.
-
(2011)
IEEE Trans. on Dependable and Secure Computing
, vol.8
, Issue.2
, pp. 161-176
-
-
Chen, I.R.1
Speer, A.P.2
Eltoweissy, M.3
-
19
-
-
84879051898
-
Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
-
H. Al-Hamadi and LR. Chen, "Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks," IEEE Transactions on Network and Service Management, Vol. 19, no. 2, 2013, pp. 189-203.
-
(2013)
IEEE Transactions on Network and Service Management
, vol.19
, Issue.2
, pp. 189-203
-
-
Al-Hamadi, H.1
Chen, L.R.2
-
20
-
-
78751620590
-
Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
-
Y. Li and LR. Chen, "Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks," IEEE Transactions on Mobile Computing, Vol. 10, no. 3, 2011, pp. 349-361.
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, Issue.3
, pp. 349-361
-
-
Li, Y.1
Chen, L.R.2
-
21
-
-
0032121578
-
Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
-
LR. Chen and T.H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Performance Evaluation, Vol. 33, no. 2, pp. 89-112, 1998.
-
(1998)
Performance Evaluation
, vol.33
, Issue.2
, pp. 89-112
-
-
Chen, L.R.1
Hsi, T.H.2
-
22
-
-
0037645949
-
Dynamic quota-based admission control with sub-rating in multimedia servers
-
S.T. Cheng, CM. Chen, and LR. Chen, "Dynamic quota-based admission control with sub-rating in multimedia servers," Multimedia Systems, Vol. 8, no. 2, pp. 83-91, 2000.
-
(2000)
Multimedia Systems
, vol.8
, Issue.2
, pp. 83-91
-
-
Cheng, S.T.1
Chen, C.M.2
Chen, L.R.3
-
23
-
-
0032309753
-
Performance evaluation of forwarding strategies for location management in mobile networks
-
I. R. Chen, T.M. Chen, and C. Lee, "Performance evaluation of forwarding strategies for location management in mobile networks," The Computer Journal, Vol. 41, no. 4, 1998, pp. 243-253.
-
(1998)
The Computer Journal
, vol.41
, Issue.4
, pp. 243-253
-
-
Chen, I.R.1
Chen, T.M.2
Lee, C.3
-
24
-
-
20844443098
-
Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
-
B. Gu, and I. R. Chen, "Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems," Mobile Networks and Applications, Vol. 10, no. 4, 2005, pp. 453-463.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.4
, pp. 453-463
-
-
Gu, B.1
Chen, I.R.2
|